Chilkat Tcl Extension Downloads

load ./chilkat.dll
# Note: Requires Chilkat v9.5.0.65 or greater.# This requires the Chilkat API to have been previously unlocked.# See Global Unlock Sample for sample code.# --------------------------------------------------------------------------# Create a Shared Access Signature (SAS) token for an Azure Storage Account.# --------------------------------------------------------------------------# See https://docs.microsoft.com/en-us/rest/api/storageservices/fileservices/constructing-an-account-sas# for details regarding the Azure Storage Account SAS fields.
set authSas [new_CkAuthAzureSAS]
CkAuthAzureSAS_put_AccessKey $authSas "AZURE_ACCESS_KEY"# Specify the format of the string to sign.# Each comma character in the following string represents a LF ("\n") character.# The names specified in the StringToSign are replaced with the values specified# in the subsequent calls to SetTokenParam and SetNonTokenParam,.# Note: The trailing comma in the StringToSign is intentional and important. This indicates that the# string to sign will end with a "\n".# Also note: The names in the StringToSign are case sensitive. The names# specified in the 1st argument in the calls to SetNonTokenParam and SetTokenParam should# match a name listed in StringToSign.CkAuthAzureSAS_put_StringToSign $authSas "accountname,signedpermissions,signedservice,signedresourcetype,signedstart,signedexpiry,signedIP,signedProtocol,signedversion,"# The account name is "chilkat". Use your own account name instead of "chilkat".# Also use your own container name instead of "mycontainer".CkAuthAzureSAS_SetNonTokenParam $authSas "accountname""chilkat"CkAuthAzureSAS_SetTokenParam $authSas "signedpermissions""sp""rwdlacup"CkAuthAzureSAS_SetTokenParam $authSas "signedservice""ss""bfqt"CkAuthAzureSAS_SetTokenParam $authSas "signedresourcetype""srt""sco"
set dt [new_CkDateTime]
CkDateTime_SetFromCurrentSystemTime $dt
CkAuthAzureSAS_SetTokenParam $authSas "signedstart""st" [CkDateTime_getAsIso8601 $dt "YYYY-MM-DDThh:mmTZD"0]
# This SAS token will be valid for 30 days.CkDateTime_AddDays $dt 30CkAuthAzureSAS_SetTokenParam $authSas "signedexpiry""se" [CkDateTime_getAsIso8601 $dt "YYYY-MM-DDThh:mmTZD"0]
CkAuthAzureSAS_SetTokenParam $authSas "signedProtocol""spr""https"# Specifiy values and query param names for each field.# If a field is not specified, then an empty string will be used for its value.CkAuthAzureSAS_SetTokenParam $authSas "signedversion""sv""2015-04-05"# Note that we did not call SetTokenParam for "signedIP". For any omitted fields# the value will default to the empty string.# Generate the SAS token.set sasToken [CkAuthAzureSAS_generateToken $authSas]
if {[expr [CkAuthAzureSAS_get_LastMethodSuccess $authSas] != 1]} then {
puts [CkAuthAzureSAS_lastErrorText $authSas]
delete_CkAuthAzureSAS $authSas
delete_CkDateTime $dt
exit
}
puts "SAS token: $sasToken"
# Save the SAS token to a file.# We can then use this pre-generated token for future Azure Storage Account operations.
set fac [new_CkFileAccess]
CkFileAccess_WriteEntireTextFile $fac "qa_data/tokens/azureStorageAccountSas.txt" $sasToken "utf-8"0delete_CkAuthAzureSAS $authSas
delete_CkDateTime $dt
delete_CkFileAccess $fac